In this sample chapter from CompTIA Security+ SY0-501 Exam Cram, 5th Edition, learn how to support organizational security through the installation and configuration of network components—both hardware and software-based.

In this sample chapter from Storage Design and Implementation in vSphere 6: A Technology Deep Dive, 2nd Edition, learn how to identify various ALUA (Asymmetric Logical Unit Access) configurations and how different configurations affect the hosts.

In this sample chapter from CompTIA A+ 220-901 and 220-902 Cert Guide, 4th Edition, author Mark Edward Soper covers; Introduction to BIOS/UEFI, explaining the motherboard’s firmware, known as the BIOS or UEFI. BIOS/UEFI Configuration which demonstrates how to access the BIOS and modify settings; for example, RAM, processor, and video settings. Flash Upgrade BIOS/UEFI where you’ll learn how to upgrade the BIOS through a process known as flashing and Using BIOS/UEFI Diagnostics where you’ll learn about diagnostic features built into many BIOS/UEFI chips.

This article provides an exam profile for the Cisco 100-105 ICND1 v3.0 exam for the CCENT and CCNA certifications. It describes question forms, trouble spots, hints for exam preparation, and recommendations for additional study resources. Find out here what you can expect to see on the exam, and how you can better prepare for it.

Employers look for and seek out certified IT professionals, but generally prefer candidates who possess both college degrees and specific certification credentials. Aspiring or active IT professionals can benefit from an informed evaluation of certifications in terms of the time commitment, cost, and other factors involved in earning such a credential vis-a-vis the ultimate financial or career advancement that such an investment can return. In this article, Ed Tittel and Mary Kyle look at one method for rating and ranking IT certifications.

Whether their ultimate intention is harming your organization or stealing its information, attackers are probably already trying to crack your network. Network engineers need to anticipate these attacks and be ready to mitigate them. Security specialist Sean Wilkins points out three attack methods that most networks will experience.